This text presents a careful introduction to methods of cryptology and error correction in wide use throughout the world and the concepts of abstract algebra and number theory that are essential for understanding these methods.
The two-volume set LNCS 11442 and 11443 constitutes the refereed proceedings of the 22nd IACR International Conference on the Practice and Theory of Public-Key Cryptography, PKC 2019, held in Beijing, China, in April 2019.
The two-volume set LNCS 11891 and 11892 constitutes the proceedings of the 17th International Conference on Theory of Cryptography, TCC 2019, held in Nuremberg, Germany, in December 2019.
This two-volume set LNCS 12192 and 12193 constitutes the refereed proceedings of the 12th International Conference on Cross-Cultural Design, CCD 2020, held as part of HCI International 2020 in Copenhagen, Denmark in July 2020.
This two volume set (CCIS 1451 and 1452) constitutes the refereed proceedings of the 7th International Conference of Pioneering Computer Scientists, Engineers and Educators, ICPCSEE 2021 held in Taiyuan, China, in September 2021.
The four-volume set LNCS 14344-14347 constitutes the refereed proceedings of the 28th European Symposium on Research in Computer Security, ESORICS 2023, which took place in The Hague, The Netherlands, during September 25-29, 2023.
This book constitutes revised selected papers from the14th International Workshop on Digital-Forensics and Watermarking, IWDW 2015,held in Tokyo, Japan, in October 2015.
This book constitutes the refereed proceedings of the Third International Conference on Security and Privacy, ICSP 2024, held in Jamshedpur, India, during November 20–21, 2024.
Master network security and cryptography with this in-depth guide covering essential concepts, techniques, and advanced topics for protecting data and networks.
In this work, algorithms and architectures for cryptography and source coding are developed, which are suitable for many resource-constrained embedded systems such as non-volatile flash memories.
This engaging and thought-provoking textbook examines the ethical, social, and policy challenges arising from our rapidly and continuously evolving computing technology, ranging from the Internet to the ubiquitous portable devices we use to access it.
This book constitutes the proceedings of the 5th International Conference on Electronic Voting, E-Vote-ID 2020, held online -due to COVID -19- in Bregenz, Austria, in October 2020.
This book constitutes revised selected papers from the 11th International Workshop on Constructive Side-Channel Analysis and Secure Design, COSADE 2021, held in Lugano, Switzerland, in October 2021.
This volume constitutes the refereed proceedings of the 4th International Conference on Digital Transformation and Global Society, DTGS 2019, held in St.
The volume LNAI 15398 constitutes the revised selected papers of the 28th International Workshop on Coordination, Organizations, Institutions, Norms, and Ethics for Governance of Multi-Agent Systems, COINE 2024, held in Auckland, New Zealand, on May 7, 2024.
The five-volume set, LNCS 14081, 140825, 14083, 14084, and 14085 constitutes the refereed proceedings of the 43rd Annual International Cryptology Conference, CRYPTO 2023.
A field manual on contextualizing cyber threats, vulnerabilities, and risks to connected cars through penetration testing and risk assessment Hacking Connected Cars deconstructs the tactics, techniques, and procedures (TTPs) used to hack into connected cars and autonomous vehicles to help you identify and mitigate vulnerabilities affecting cyber-physical vehicles.
This book constitutes the refereed post-conference proceedings of the Second International Conference on Cryptology and Malicious Security, held in Kuala Lumpur, Malaysia, December 1-2, 2016.
This book constitutes the refereed proceedings on the 23rd Nordic Conference on Secure IT Systems, NordSec 2018, held in Oslo, Norway, in November 2018.
This book constitutes the proceedings of the 14th International Conference on Distributed Computing and Internet Technology, ICDCIT 2018, held in Bhubaneswar, India, in January 2018.
This book constitutes the refereed proceedings of the 14th International Conference on Virtual Reality and Augmented Reality, EuroVR 2017, held in Laval, France, in December 2017.
This book constitutes the proceedings of the 17th International Conference on Risks and Security of Internet and Systems, CRiSIS 2021, which took place during November 11-13, 2021.
The four-volume proceedings set LNCS 14601-14604 constitutes the refereed proceedings of the 27th IACR International Conference on Practice and Theory of Public Key Cryptography, PKC 2024, held in Sydney, NSW, Australia, April 15-17, 2024.
The volume LNAI 15398 constitutes the revised selected papers of the 28th International Workshop on Coordination, Organizations, Institutions, Norms, and Ethics for Governance of Multi-Agent Systems, COINE 2024, held in Auckland, New Zealand, on May 7, 2024.
This reference text presents the important components for grasping the potential of social computing with an emphasis on concerns, challenges, and benefits of the social platform in depth.
This book explains the evolution of techniques and strategies in quantum computing, discussing the digital transition towards the quantum computing application in various sectors.
This book is an edition of the General Report on Tunny with commentary that clarifies the often difficult language of the GRT and fitting it into a variety of contexts arising out of several separate but intersecting story lines, some only implicit in the GRT.
This bookconstitutes the thoroughly refereed proceedings of the 8th International Conference on theTheory and Application of Cryptographic Techniques in Africa, AFRICACRYPT 2016,held in Fes, Morooco, in April 2016.
The book explores modern sensor technologies while also discussing security issues, which is the dominant factor for many types of Internet of Things (IoT) applications.
This book constitutes the refereed proceedings of the 9th International Conference on the Theory and Application of Cryptographic Techniques in Africa, AFRICACRYPT 2017, held in Dakar, Senegal, in May 2017.
This book constitutes the refereed proceedings of the First International Conference on Future Data and Security Engineering, FDSE 2014, held in Ho Chi Minh City, Vietnam, in November 2014.